Zobrazeno 1 - 10
of 146
pro vyhledávání: '"System of communication"'
Autor:
Labudová, Lenka, Jánošová, Denisa
Publikováno v:
Megatrendy a médiá / Megatrends and Media. 7(1):362-367
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1010056
Autor:
Jackson, Stephen1 stephen.jackson@beds.ac.uk
Publikováno v:
Information & Organization. Apr2011, Vol. 21 Issue 2, p57-83. 27p.
Autor:
Kapoor, Hemangee K.1 hemangee@iitg.ernet.in
Publikováno v:
IEEE Transactions on Computers. Jul2009, Vol. 58 Issue 7, p931-944. 14p. 4 Diagrams, 2 Charts.
Autor:
Oleksandr Nesterov
Publikováno v:
Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, Vol 36, Iss 3, Pp 11-14 (2019)
One of the most actual scientific challenges in the area of military command while conducting an operation for the special-purpose communication system is the real-time data transmission in accordance with requirements for the service quality standar
Externí odkaz:
https://doaj.org/article/947078ec59784b1a8c96df3204e3e45c
Autor:
Dmytro Shevchenko
Publikováno v:
Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, Vol 35, Iss 2, Pp 23-28 (2019)
The article deals with the actual issue of improving the scientific and methodical apparatus for evaluating the effectiveness of the digital communication line. Recent researches and publications on this issue have been analyzed. The analysis shows t
Externí odkaz:
https://doaj.org/article/c32f7288eb5e4be9adeafe14226df907
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology
Autor:
Mikhail B. Abrosimov, Iehab A. Kamil
Publikováno v:
Безопасность информационных технологий, Vol 25, Iss 1, Pp 65-73 (2018)
One of the first threats that prompted the creation of intrusion prevention systems is considered to be the "Morris worm", which hit computers in late 1988. Intrusion prevention systems evolved, and eventually became a full-fledged system incorporati
Externí odkaz:
https://doaj.org/article/b5007e99e4d64820b049d170d7bebae7
Publikováno v:
IET Radar, Sonar & Navigation, Vol 11, Iss 12, Pp 1802-1814 (2017)
Decentralised detection using censored observations is an effective way to mitigate communication constraints where each sensor only transmits the ‘informative’ observations to a fusion centre (FC), and censors those deemed ‘uninformative’. I
Externí odkaz:
https://doaj.org/article/29b607c847f94e8ca4c8dee8d087b6bd
Autor:
Mubuyaeta, Mishake, Ngulube, Patrick
Publikováno v:
Regional Journal of Information and Knowledge Management; Vol. 8 No. 1 (2023); 122-151
Rationale of Study – This article presents the findings of a study on the knowledge management (KM) implementation strategy for two mobile telecommunications (MT) companies in Namibia. Methodology – The case study used a mixed-methods approach vi
Autor:
Deepika Verma, Ramapati Mishra
The rapid development in wireless communications has demanded multiband or wideband antennas to support wireless communication devices such as smart phones, tablets, laptop computers, RADAR system, satellite communication, airplane, and unmanned airb
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eb930ffeae8c2999885e0743d4886006